Nowadays, in most countries, the most dangerous and life threatening infection is Chronic Kidney Disease (CKD). A progressive malfunctioning of the kidneys and less effectiveness of the kidney are considered CKD. CKD can be a life threatening disease if it continues for longer period of time. Prediction of chronic disease in early stage is very crucial so that sustainable care of the patient is taken to prevent menacing situations. Most of the developing countries are being affected by this deadly disease and treatment applied for this disease is also very expensive, here in this paper, a Machine Learning (ML)-positioned approach called Neuro-Fuzzy model is used for prediction belonging to CKD. Based on the image processing technique, fibrosis proportions are detected in the kidney tissues. It also builds a system for identifying and detection of CKD at an early stage. Neuro-Fuzzy model is based on ML which can detect risk of CKD patients. Compared with other conventional methods such as Support Vector Machine (SVM) and K-Nearest Neighbor (KNN), the proposed method of this paper — ML-based Neuro-Fuzzy logic method — obtained 97% accuracy in CKD prediction. This method can be evaluated based on various parameters such as Precision, Accuracy, Recall and F1-Score in CKD prediction. From the results, the patients having high risk of chronic disease can be predicted.
In order to secure network and data transmission via a wireless network, cryptography and network encryption is being used. Providing data protection is one of the key aspects of wireless network data transmission. There are sensors in the wireless networks; they are linked to the base station. The need for protection of the wireless network sensor is very critical, and encryption and network security are necessary. Network security includes security for the terminal system as well as for the whole network system. Network security is one of the main concerns as the world transitions into the digital world. Security of the network provides security for administrator managed data. Increasing communication technology also requires safe communication which is met through various encryption techniques such as cryptography, digital signatures, watermarking, steganography and other applications. Cryptography is a technique of encryption used to protect the network, as various networks are related and admire attacks and intrusions. In this paper we discuss the cryptography with its aims, forms and algorithms. Intrusion and computer protection technologies are also used in attack forms.
Abstract-Delivering software in traditional ways is challenged by agile software development to provide a very different approach to software development. Agile methods aim at fast, light and efficient than any other vigorous method to develop and support customers business without being chaotic. Agile software development methods claim to be people-oriented rather than process-oriented and adaptive rather than predictive. Solid Determination and Dedicated efforts are required in agile development to overcome the disadvantages of predefined set of steps and changing requirements to see the desirable outcome and to avoid the predictable results. These methods reach the target promptly by linking developers and stakeholders. The focus of this research paper is two fold. The first part is to study different agile methodologies, find out the levelheaded difficulties in agile software development and suggests possible solutions with a collaborative and innovative framework. The second part of the research paper concentrates on the importance of handling traceability in agile software development and finally proposes an ingenious and organized theoretical framework with a systematic approach to agile software development.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.